Skip to main navigation menu Skip to main content Skip to site footer

A Proposed Method for Real-Time Automatic Cloud Storage and Analysis of Detected Suspicious Activities to Ensure Data Integrity and Security

Abstract

Cloud computing provides flexibility and scalability to enterprises but also poses devastating threats such as data leakage and unauthorized access. This study presents a prototypical security framework of a hybrid cloud system that combines the use of machine learning-based anomaly detection and cryptographic techniques regarding the confidentiality, integrity, and availability (CIA) of dynamic cloud storage to preserve data integrity. The framework uses Random Forest (RF) feature selection and Deep Neural Networks (DNN) to detect anomalies and design a real-time, scalable framework to identify suspicious behavior, supported by a hybrid cryptographic model using Attribute-Based Encryption (ABE) and lightweight algorithms. It is CICIDS2017 and UNSW-NB15 validated and is deployed in AWS and Azure testbeds. Hybrid implemented a high detection rate (98.3 percent) and a low false positive rate (1.2%), and cryptographic operations had an average loading of 4.3 ms/MB. The hybrid model showed better results when compared to standalone RF (95.8%) and DNN (97.6%). Comparisons with other recent articles prove that performance is competitive, although some articles reported accuracy rates above 99.9%. The results establish that the hybrid solution provides high detection, effective cryptography, and great scalability in the context of a multi-cloud environment. Banking, healthcare enterprises and government agencies are examples of enterprises that can implement this framework to limit the risks and realize secure real-time operation. It is possible that future studies can develop quantum-resistant cryptography and federated learning combinations.

Keywords

Data Integrity , Cryptography, Cloud Security, Hybrid Anomaly Detection, Multi-Cloud Framework

PDF

References

  1. Nafiseh Soveizi, Fatih Turkmen, Dimka Karastoyanova, Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. Future Generation Computer Systems 148 (2023) 184–200.
  2. X. Ye, S. Liu, Y. Yin, Y. Jin, User-oriented many-objective cloud workflow scheduling based on an improved knee point driven evolutionary algorithm, Knowl. Based Syst. 135 (2017) 113–124, http://dx.doi.org/10.1016/j.knosys.2017.08.006.
  3. W. Liu, S. Peng, W. Du, W. Wang, G.S. Zeng, Security-aware intermediate data placement strategy in scientific cloud workflows, Knowl. Inf. Syst. 41 (2) (2014) 423–447, http://dx.doi.org/10.1007/s10115-014-0755-x.
  4. A.O. Francis, B. Emmanuel, D.D. Zhang, W. Zheng, Y. Qin, D.D. Zhang, Ex-ploration of secured workflow scheduling models in cloud environment: A survey, in: Proc. - 2018 6th Int. Conf. Adv. Cloud Big Data, CBD 2018, 2018, pp. 71–76, http://dx.doi.org/10.1109/CBD.2018.00022.
  5. S. Hosseinzadeh, S. Hyrynsalmi, M. Conti, V. Leppänen, Security and privacy in cloud computing via obfuscation and diversification: A survey, in: Proc. - IEEE 7th Int. Conf. Cloud Comput. Technol. Sci. CloudCom 2015, 2016, pp. 529–535, http://dx.doi.org/10.1109/CloudCom.2015.29.
  6. Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara, Abdulatif Alabdulatif, Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. Journal of King Saud University – Computer and Information Sciences 34 (2022) 10217–10245
  7. Aneja, M.J.S., Bhatia, T., Sharma, G., Shrivastava, G., 2018. In: Artificial intelligence based intrusion detection system to detect flooding attack in VANETs. IGI Global, pp. 87–100.
  8. M. Vanitha, M. Navya Patel, K. Madhumitha, J. Sathvika. Enhancing Insider Threat Detection in Cloud Environments Through Ensemble Learning. International Journal of Communication Networks and Information Security, ISSN: 2073-607X, 2076-0930, Volume 16 Issue 05 Year 2024.
  9. Alok Mishra, Thr Satar Jabar, Yehia Ibrahim Alzoubi & Kamta Nath Mishra. Enhancing privacy-preserving mechanisms in Cloud storage: A novel conceptual framework.
  10. Akremi A, Rouached M. A comprehensive and holistic knowledge model for cloud privacy protection. J Supercomput. 2021;77:7956-7988.
  11. Salek MS, Khan SM, Rahman M, et al. A review on cybersecurity of cloud computing for supporting connected vehicle applications. IEEE Internet Things J. 2022;9:8250-8268. doi:10.1109/JIOT.2022.3152477
  12. Rashid Z, Noor U, Altmann J. Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem. Fut Gener Comput Syst. 2021;124:436-466.
  13. Jayaraman I, Stanislaus Panneerselvam A. A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud. J Amb Intell Human Comput. 2021;12:4911-4924.
  14. Tissir N, El Kafhali S, Aboutabit N. Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal. J Reliab Intell Environ. 2021;7:69-84.
  15. Chinnasamy P, Padmavathi S, Swathy R, Rakesh S. Efficient data security using hybrid cryptography on cloud computing. In: Ranganathan G, Chen J, Rocha A, eds. Inventive Communication and Computational Technologies. Vol 145. Springer; 2021:537-547.
  16. Alok Mishra, Thr Satar Jabar, Yehia Ibrahim Alzoubi and Kamta Nath Mishra. Enhancing privacy-preserving mechanisms in Cloud storage: A novel conceptual framework. Concurrency Computat Pract Exper. 2023; 35:e7831. wileyonlinelibrary.com/journal/cpe 1 of 21, https://doi.org/10.1002/cpe.7831
  17. Badhan, A., Vasudev, H., Kapila, D., & Himanshu (2024). Data Security in Cloud Environment Using Cryptography Technique for End-to-End Encryption. E3S Web of Conferences.
  18. Salek MS, Khan SM, Rahman M, et al. A review on cybersecurity of cloud computing for supporting connected vehicle applications. IEEE Internet Things J. 2022;9:8250-8268. doi:10.1109/JIOT.2022.3152477
  19. Gupta BB, Agrawal DP, Haoxiang W. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press: Taylor & Francis Group; 2019.
  20. Alzahrani A, Alyas T, Alissa K, Abbas Q, Alsaawy Y, Tabassum N. Hybrid approach for improving the performance of data reliability in cloud storage management. Sensors. 2022; 22:5966.
  21. J. Singh, G. Singh and A. Badhan, "Integrated Cloud and Blockchain Framework: A Secure Solution for Healthcare Data Management," 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT), Faridabad, India, 2024, pp. 1259-1266, doi: 10.1109/ICAICCIT64383.2024.10912123.
  22. A. Badhan and S. S. Malhi, "Enhancing Data Security and Efficiency: A Hybrid Cryptography Approach (AES + ECC) Integrated with Steganography and Compression Algortihm," 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, 2025, pp. 450-456, doi: 10.1109/IDCIOT64235.2025.10914830.
  23. Waqar A, Raza A, Abbas H, Khan MK. A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata. J Netw Comput Appl. 2013; 36:235-248.
  24. Shukla DK, Dwivedi VK, Trivedi MC. Encryption algorithm in cloud computing. Mater Today: Proc. 2021;37:1869-1875.
  25. A. Badhan, S. S. Malhi, H. Singh, G. Kaur and S. Bharany, "Implementation of AES Cryptography to Smart Farming Data using IoT Under Agile Framework," 2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2024, pp. 541-546, doi: 10.1109/ICECA63461.2024.10800999.
  26. Ramalingam C, Mohan P. Addressing semantics standards for cloud portability and interoperability in multi cloud environment. Symmetry. 2021;13:317.
  27. Alzoubi YI, Osmanaj VH, Jaradat A, Al-Ahmad A. Fog computing security and privacy for the internet of thing applications: state-of-the-art. Sec Privacy. 2021; 4:e145.
  28. Wan Z, Deng RH. HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inform Forens Secur. 2011;7:743-754.
  29. Garcia Martinez, Haryam, "exploring secure methods for ensuring data integrity: a theoretical analysis of cryptographic and detection techniques" (2024). Electronic Theses, Projects, and Dissertations. 2094. https://scholarworks.lib.csusb.edu/etd/2094
  30. Abraham, R., Schneider, J., & vom Brocke, J. (2019). Data governance: a Conceptual framework, Structured review, and Research Agenda. International Journal of Information Management, 49(2), 424–438.
  31. Adee, R., & Mouratidis, H. (2022). A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors, 22(3), 1109. https://doi.org/10.3390/s22031109
  32. Allioui, H., & Mourdi, Y. (2023). Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey. Sensors, 23(19), 8015.
  33. A. Badhan and S. S. Malhi, "Enhancing Data Security with Hybrid Cryptography and Steganography," 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT), Faridabad, India, 2024, pp. 1247-1252, doi: 10.1109/ICAICCIT64383.2024.10912267.
  34. Ferretti, L., Marchetti, M., Andreolini, M., & Colajanni , M. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases. Information Sciences, 422, 497–515.
  35. Kebande, V. R., Karie, N. M., & Ikuesan, R. A. (2020). Real-time monitoring as a supplementary security component of vigilantism in modern network environments. International Journal of Information Technology, 13(1), 5–17.
  36. Khalid, M. I., Ahmed, M., & Kim, J. (2023). Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs. Sensors, 23(17), 7604.
  37. Chauhan, M.; Shiaeles, S. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network 2023, 3, 422–450. https://doi.org/10.3390/network3030018
  38. Amara, N.; Huang, Z.; Awais, A. Cloud Computing Security Threats and Attacks with Their Mitigation Techniques. In Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, 12–14 October 2017.
  39. Chang, V.; Ramachandran, M. Towards Achieving Data Security with the Cloud Computing Adoption Framework. IEEE Trans. Serv. Comput. 2016, 9, 246–258.
  40. Hadeel T. El?Kassabi, Mohamed Adel Serhani, Mohammad M. Masud, Khaled Shuaib3 and Khaled Khalil. Deep learning approach to security enforcement in cloud workflow orchestration. Journal of Cloud Computing (2023) 12:10
  41. Dinal Herath J, Bai C, Yan G, Yang P, Lu S (2019) RAMP: Real?Time Anomaly Detection in Scientific Workflows. Proc. ? 2019 IEEE Int. Conf. Big Data, Big Data 2019. pp 1367–1374.
  42. A. Badhan and S. S. Malhi, "A Review on Hybrid Cryptography approach with Steganography," 2024 12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks (IEMECON), Jaipur, India, 2024, pp. 1-7, doi: 10.1109/IEMECON62401.2024.10846056.
  43. Paromita Goswami, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan and Ghanshyam Singh. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing (2024) 13:45
  44. Magalhaes D, Calheiros RN, Buyya R, Gomes DG (2015) Workload modeling for resource usage analysis and simulation in cloud computing. Comput Electr Eng 47:69–81
  45. Hong H, Sun Z, Xia Y (2017) Achieving secure and fine-grained data authentication in cloud computing using attribute-based proxy signature. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE). IEEE, pp 130–134.
  46. Shen W, Qin J, Yu J, Hao R, Hu J (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensic Secur 14(2):331–346
  47. Raman Dugyala, Premkumar Chithaluru, M. Ramchander, Sunil Kumar, Arvind Yadav, N. Sudhakar Yadav, Diaa Salama Abd Elminaam & Deema Mohammed Alsekait. Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization. Scientific Reports | (2024) 14:30906
  48. Soni, D. & Kumar, N. Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy. J. Netw. Comput. Appl. 205, 103419 (2022).
  49. A. Ramachandran P. Ramadevi, Ahmed Alkhayyat and Yousif Kerrar Yousif., Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment. IASC, 2023, vol.36, no.2
  50. TAN Shuang, TAN Lin, LI Xiaoling, JIA Yan. An Efficient Method for Checking the Integrity of Data in the Cloud. China Communications, September 2014
  51. ATENIESE G, BURNS R, CURTMOLA R, et al. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 2011,14(1): 1-34.
  52. WANG Q, WANG C, LI J, et al. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems. 2011. 22(5): 847-859.
  53. A. Badhan, P. Arora, R. Garg and R. Kaur, "Energy Efficient Cloud Computing: Strategies for Reducing Data Center Power Consumption," 2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2025, pp. 1156-1162, doi: 10.1109/ICAISS61471.2025.11041956.
  54. Muthyalac, S., & Reddy, P. (2022b). Ai-Driven Cloud Access Control and Authorization Using Attribute-Based Encryption Ai-Driven Cloud Access Control and Authorization Using Attribute-Based Encryption. International Journal of Engineering Trends and Applications.
  55. Abdel-Basset M, Mohamed M, Chang V. NMCDA: a framework for evaluating cloud computing services. Futur Gener Comput Syst. 2018; 86: 12-29.
  56. Rathore S, Kwon BW, Park JH. BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network. J Netw Comput. Appl. 2019, 143: 167-177.
  57. Abdulmohsen Almalawi, Shabbir Hassan, Adil Fahad and Asif Irshad Khan., A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks. International Journal of Computational Intelligence Systems (2024).
  58. M. A. . Omer, A. A. . Yazdeen, H. S. . Malallah, and L. M. . Abdulrahman, “A Survey on Cloud Security: Concepts, Types, Limitations, and Challenges”, JASTT, vol. 3, no. 02, pp. 101–111, Dec. 2022, doi: 10.38094/jastt301137
  59. L. M. . Abdulrahman, S. H. . Ahmed, Z. N. . Rashid, Y. S. . Jghef, T. M. . Ghazi, and U. H. . Jader, “Web Phishing Detection Using Web Crawling, Cloud Infrastructure and Deep Learning Framework”, JASTT, vol. 4, no. 01, pp. 54–71, Mar. 2023, doi: 10.38094/jastt401144.
  60. V. Shakir and A. Mohsin, “A Comparative Analysis of Intrusion Detection Systems: Leveraging Classification Algorithms and Feature Selection Techniques”, JASTT, vol. 5, no. 01, pp. 34–45, May 2024, doi: 10.38094/jastt501186..

Downloads

Download data is not yet available.

Similar Articles

1-10 of 67

You may also start an advanced similarity search for this article.